February 19, 2019 - Note to self: When you’re doing your backups, make sure you have them on a different place than your production network. That’s a lesson learned the hard way by VFEmail.net, a worldwide email service provider, which recently lost not only its subscribers’ email messages, but also all its backups, because they were all on the...... READ MORE

Blogs

Came across the project Euler web site – https://projecteuler.net. It has literally hundreds of problems – mainly mathematical – that’ll illustrate some useful PowerShell techniques. The first problem is summing multiples.

The concept of a physical wall for security has been the subject of much debate in recent months. While you may be sick of hearing about it (don’t worry, this is not a political post), one overlooked talking point is the use of a metaphorical wall for security circa 2019. For us in the tech sector, …READ MORE

Inspired by the cafes in Silicon Valley that developers hang out at to meet fellow coders and potential employers, Google has opened a similar space at its Asia-Pacific headquarters in Singapore for the developer community in Southeast Asia.

Experience is everything, or so we’re told — this is the age of the experience economy and millennials and Gen-Z’ers will (allegedly) now even turn down (or leave jobs) if they’re not ‘getting the right experience’ in their workplace.

Nothing even vaguely amusing has happened in the world of technology this week, cutting the lifeblood of this blog off at its source.
We watched on as MPs announced their newfound independence and hoped in vain for Chuka Umunna to sling us a bone with at least some mad throwaway accusation that Jer…READ MORE

In the days of the industrial revolution, work was a place. A coal mine, an oil well, a train yard, and a factory.The goal was to get the factory to run itself, as efficiently as possible. With the work stable, predictable, and repeatable under scientific management, the owners can walk away and col…READ MORE

Late last year MS started testing an Office app (UWP) with Insiders. It replaced the preceding “My Office” with a slicker new version. Starting today, February 20, 2019, anybody who wants to can download the app from the Store (here’s the Office Apps blog announcement). OnMSFT.com also reports that …READ MORE

As part of JEP-291, the popular Concurrent Mark Sweep garbage collection algorithm has been deprecated by Java Development Kit 9. This decision was made to both reduce the maintenance burden of garbage collection (GC) code and to accelerate new development.

The Meltdown and Spectre vulnerabilities disclosed in early 2018 dominated much of the infosec discussions and news coverage last year, including those at RSA Conference 2018. But this at year’s event, speculative execution threats are virtually non-existent.

Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations centre), I found myself wondering just how apt those analogies really are.
For example, there’s t…READ MORE

Data breaches are rarely out of the headlines and compliance pressure, such as the introduction of GDPR, means security remains high on the corporate agenda. Cyber threats and data breaches are no longer the sole domain of the IT department, they must be considered at board level as the repercussion…READ MORE

Next month will be the 30th anniversary of the world wide web. In 1989, who would have thought the web would touch every aspect of people’s lives – not only in a good way but also in ways that seem to undermine the fabric of society? An elegant way for researchers across the globe to collaborate, …READ MORE

There are those cases when VMs need super fast storage in the cloud. Now Azure has an offering to get you that storage speed. With the introduction of the Lsv2-series of VMs, you can now get NVMe storage on your Azure VMs. Like with the other VM sizes, the more CPU that you purchase, the more storag…READ MORE

I re-read the “Initial National Cyber Security Skills Strategy: increasing the UK’s Cyber Security Capability” after attending the first of their discussion meetings. The meeting illustrated the difficulty of the task the DCMS team will have reconciling the need of MoD and GCHQ for patriotic c…READ MORE